20
AT&T Consultant/Vendor Sales Group UPDATE inside... 3 Kari’s Corner: Change Is Inevitable –Kari Aguinaldo 4 Data with David –Tom David 8 Yikes, I’ve Been Hacked! –Nancy Grover 10 AT&T BusinessDirect® –Robert Sloan 16 Security for Small Electronic Devices –Jerry Hinek December 2006 As we bring this truly transformational year to a close, I want to thank you for your outstanding contributions and your continued confidence in AT&T. With so many exciting new developments in our business, I want to emphasize two things that haven’t changed: First, you can count on AT&T to continue to earn your trust. And second, you have our commitment that we will continue to support our Consultant Liaison Program. The new AT&T is Number One in serving business customers. We have a superior network, global reach, the best customer care and proven ability to integrate services. Providing you and our mutual customers with world- class solutions and support is key to our continued success. It was clear when the SBC/AT&T merger was announced that we had an unprecedented opportunity to lead the industry’s transformation and build a new generation of solutions for business customers. Now, we have everything we need to make our vision a reality – the network, the products, the people, and especially our partnership with all of you. I hope you’re as enthusiastic as I am about the opportunities that lie ahead. We know you’re counting on us – and you have my promise – you can continue to trust AT&T to deliver for you and your clients. Robin MacGillivray President, AT&T West Business Communications Services a message from robin

UPDATE AT&T Consultant/Vendor Sales Group · PDF fileUPDATEAT&T Consultant/Vendor Sales Group inside ... Change Is Inevitable –Kari Aguinaldo 4 Data with David –Tom David 8 Yikes,

  • Upload
    vuthu

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

AT&T Consultant/Vendor Sales Group

UPDATE

ii nn ss ii dd ee .. .. ..

33Kari’s Corner:

Change Is Inevitable–Kari Aguinaldo

44Data with David–Tom David

88Yikes, I’ve Been

Hacked!–Nancy Grover

1100AT&T BusinessDirect®

–Robert Sloan

1166Security for SmallElectronic Devices

–Jerry Hinek

December 2006

As we bring this truly transformational year to aclose, I want to thank you for your outstandingcontributions and your continued confidence inAT&T. With so many exciting new developments inour business, I want to emphasize two things thathaven’t changed:

First, you can count on AT&T to continue to earnyour trust.

And second, you have our commitment that wewill continue to support our Consultant Liaison Program. The new AT&Tis Number One in serving business customers. We have a superiornetwork, global reach, the best customer care and proven ability tointegrate services. Providing you and our mutual customers with world-class solutions and support is key to our continued success.

It was clear when the SBC/AT&T merger was announced that we hadan unprecedented opportunity to lead the industry’s transformation andbuild a new generation of solutions for business customers. Now, wehave everything we need to make our vision a reality – the network, theproducts, the people, and especially our partnership with all of you.

I hope you’re as enthusiastic as I am about the opportunities that lieahead.

We know you’re counting on us – and you have my promise – youcan continue to trust AT&T to deliver for you and your clients.

RRoobbiinn MMaaccGGiillll iivvrraayyPresident, AT&T West Business Communications Services

aa mm ee ss ss aa gg ee ff rr oo mm rr oo bb ii nn

2

iinn tthhiiss iissssuuee......

33Kari’s Corner: Change Is Inevitable by Kari Aguinaldo

44Data with David by Tom David

77

Welcome Mike Aaron

88Yikes, I’ve Been Hacked! by Nancy Grover

1100

AT&T BusinessDirect by Robert Sloan

1111When Staff Can’t Get to Work

Quiz: Test Your IT IQ

1122

The Evolving Network

1144CVSG Survey Results

California Hospital Upgrades Data Network with AT&TServices

1155

AT&T Launches Remote Home Monitoring Video ServiceNationwide

1166Security for Small Electronic Devices by Jerry Hinek

1188AT&T Completes Acquisition of USi

UUPPDDAATTEE EEddiittoorrElaine [email protected]

CCoonnttrriibbuuttoorrssKari AguinaldoTom DavidNancy GroverJerry HinekRobin MacGillivrayRobert Sloan

LLaayyoouutt && DDeessiiggnnLillian CramAT&T MultiMedia Productions

PPuubblliisshheerrAT&T West BusinessCommunications ServicesSales Operations

3

kk aa rr ii ’’ ss cc oo rr nn ee rr

C h a n g e I s I n e v i t a b l e

This has certainlybeen a year ofchange, and some ofthose changes haveoccurred in our ownCVSG! In August oureditor, teammateand friend Craig

MacDonald retired from the companyafter almost 27 years of service. Wewish him well in following his dreamof writing, researching and lecturingabout the Gold Rush era. ElaineTipping has come on board as our newUPDATE editor, and we welcome her insupporting us with many new andcreative ideas.

Another change is our liaisonsupport in Northern California. Afterfive years with our team, BreeNimitsilpa has moved on to anothergroup in the company. Herreplacement is Mike Aaron. Mikecomes to our group with a wealth ofenthusiasm, knowledge andexperience. Learn more about Mike inhis article on page 7.

Our long time readers will noticethat the UPDATE format has been –well – updated. Following our Augustissue, we conducted a survey askingyour opinion about communicationsfrom the AT&T Consultant VendorSales Group. We listened, and havemade what we believe are positivechanges. Please see the results fromour survey on page 14.

Changes are a constant in ourindustry too. “The Evolving Network”(page 12) takes a look at some ofthese changes. We also have sometips on how to deal with the bad guyswho hack and hijack e-mail accounts(page 8). We’ve included some casestudies to help you understand how toupgrade and increase your customers’operating efficiencies. And of course,

our own Tom David provides in-depthinformation about OPT-E-MAN in “Datawith David” (page 4).

In the midst of all these changes,our mission has remained the same: tohelp you and your customers be moresuccessful. Please give us a call at1-800-552-5299 if you have anyfeedback, comments, questions, orneed assistance.

We look forward to a successful2007.

KKaarrii AAgguuiinnaallddooCVSG [email protected]

In the midstof all thesechanges, ourmission hasremainedthe same:to help youand yourcustomersbe moresuccessful.

READ THE WORLD OVER

4

dd aa tt aa ww ii tt hh dd aa vv ii dd

The focus in thetelecom industry israpidly shifting fromvoice to data ascarrier networksmigrate from circuitswitched to packetswitched. Asbandwidth

requirements increase, customerscontinue to want more cost-effectiveand higher bandwidth services across ametropolitan area. Ethernet, the favoriteprotocol of Local Area Networking, isbecoming the generally acceptedprotocol in Metropolitan Area Networks(MAN), providing transparentconnections at continually higherspeeds. A MAN is characterized as intra-city in nature, about 75-80 miles inlength, with bursty traffic. Ethernet is aneasy technology to manage, it’s flexible,cost-effective and it provides scalability,which is a feature not easily provided byany other service available today.

As the power of applications, PCs andworkstations increases, the need toconnect them at higher speeds becomesgreater. High-speed interconnection ofLANs and Dedicated Internet Access aregreat applications that can takeadvantage of the benefits of Ethernet.Customers who have multiple locationswithin a metropolitan area, and usersrunning bandwidth-intensiveapplications such as large file transfersfor database storage and retrieval,distance learning streamingtechnologies, medical imaging,CAD/CAM applications, disasterrecovery/Storage Area Networks,Internet access or video, would benefitfrom Optical Ethernet Products.

(Read more about a California hospital’sOPT-E-MAN® solution on page 14.)

OOpptt ii ccaa ll EEtthhee rrnnee ttMMeett rrooppooll ii ttaann AArreeaa NNeettwwoorrkk((OOPPTT--EE--MMAANN®®))AT&T has an extensive optical

infrastructure and provides metro areaconnectivity known as Optical Ethernet

Metropolitan Area Network (OPT-E-MAN)to link customer facilities in a singlemanaged transparent LAN service. Thisservice was introduced in 2003 and isnow offered in 41 metropolitan areaswithin the legacy SBC 13-state territory.OPT-E-MAN is an advanced, packet andfiber-based Layer 2 transport that actsas an Ethernet bridge to transparentlyinterconnect multiple customer localarea networks within the same LATA(intraLATA), and may also be used as anunderlying Dedicated Internet Accesstransport.

OPT-E-MAN supports nearly any datatransport configuration—point to point,point to multi-point, or multi-point tomulti-point—using physical and virtualconnections to meet specific businessneeds. AT&T will provision logical pointto point connections (OPT-E-MAN Basic)and multi-point connections (OPT-E-MAN Basic Plus) based on customerneeds for data flow of traffic,applications, prioritization, and desiredbandwidth usage. Connections to theservice range from 5 Mbps – 1 Gbps,providing flexible bandwidth increments(5, 10, 20 50, 100, 250, 500 and 1000Mbps) to support customerrequirements. OPT-E-MAN supports twogrades of service (GoS). Bronze GoS issuggested for traffic with more latencytoleration such as general data traffic,Internet access, etc. Silver GoS issuggested for more critical applicationswith low-latency requirements such asVoIP. Customers can connect to OPT-E-MAN using a switch, bridge or router.

Customers best suited for this servicehave a need to connect multiplelocations and include medium and largebusiness customers in all industriesincluding the public and private sectors.Vertical markets include government,education, health care, financial, retail,and high tech, as well as InternetService Providers and ApplicationService Providers.

As thepower of

applications,PCs and

workstationsincreases,

the need toconnectthem athigherspeeds

becomesgreater.

5

BBeenneeff ii ttssSS iimmppll ii ff iiccaatt iioonn aanndd CCoonnvveenn iieenncceeooff NNeettwwoorrkk AArrcchh ii tteeccttuurreeOPT-E-MAN is provisioned over a fiber

facility to the customer premise andprovides an Ethernet interface that canincrease bandwidth dramatically – e.g.10/100 Base T interface can supportfrom 5 Mbps to 100 Mbps without a newinterface being installed.

By connecting via Ethernet, there isno requirement to incorporate aseparate protocol or interface. Thenative Ethernet frame structure ispreserved. A single handoff from AT&T tothe customer adds convenience andsimplicity to the network architecture.OPT-E-MAN allows IT managers tomaintain connections withoutintroducing new or additional protocols.

AT&T will install and maintain allequipment needed to provide directconnectivity to the customer’s existingequipment using standard connectors.As a result, for customers, it appears asif all equipment for their network is inthe same building or campus – thetransfer of data across the MANbecomes completely transparent. Thissimplifies network operations and allowsfor rapid deployment and serviceprovisioning once service is installed.The AT&T Enhanced Network OperationsCenter (ENOC) will monitor the network24 x 7, providing the customer a fullymaintained and managed networksolution and simplifying networkmanagement and administration as wellas reducing cost.

CCoosstt --EE ff ffeecctt ii vveeOPT-E-MAN provides the customer

with a widely available, well understoodtechnology, reducing their operationalcosts for training, employees,maintenance and administration, as wellas capital costs for equipment.Additionally, OPT-E-MAN is very pricecompetitive when compared to FrameRelay and ATM services at equivalentbandwidth levels and contract terms.

Ethernet interfaces are less expensivebecause fewer physical interfaces,servers, and routers are necessary. Formost customers, this service will be“plug and play” on their existingequipment. By utilizing standard

interfaces to provide direct compatibilityto the customer’s existing equipment,there is no need for up-front investmentin expensive CPE. Further cost savingsare derived from ports – 100 Mbps forinstance on an Ethernet router are 10–20 times less expensive than OC-3 portson SONET equipment. In addition, mostbusiness IT managers are familiar withthe Ethernet protocol while Telcoservices such as ATM and evendedicated services are less ubiquitous. Inthe IT world, additional training costs arevirtually eliminated.

Ethernet requires less equipment,service and operational expense.Because Ethernet is the dominantstandard in the LAN arena, demandcontinues to drive down hardwareprices. Many customers will eliminatethe need to purchase expensive serversand internetworking equipment, such asbridges or routers, at remote LAN sites.Additionally, because most corporatenetworks are using Ethernet, companieswill be able to save additional expensesin training, management, andadministration expenses.

OPT-E-MAN allows customers to addbandwidth as their needs grow so inessence, customers only pay for whatthey use.

Here are four instances when scalingwill prove beneficial to customers:

• Changes in business patterns: changein the number of employees,applications, business conditions,mirroring, or database replication.

• Seasonal/anticipated events: sales,promotions, holiday credit validation,school registration, and sports events.

• Unanticipated events: data analysis,research, back-up service, disasterrecovery, or software development.

• High volume traffic: during the schoolyear/school day vs. during schoolholidays or summer vacation.

Customers in a traditional non-managed service incur costs in dollarsand man-hours when purchasing,maintaining and managing their ownnetworks. With OPT-E-MAN, thecustomer has no costly software orequipment to own and/or growobsolete, no engineers to hire, and no

OPT-E-MANallowscustomers toaddbandwidthas theirneeds growso inessence,customersonly pay forwhat theyuse.

Continued on page 6

6

continuous training requirements.

NNeettwwoorrkk FFlleexxiibbiill iittyyGreater network flexibility allows the

customer to add new locations withease. In addition, changing the capacityof bandwidth between existing locationsis easier and faster. OPT-E-MAN is easierto administer than existing FrameRelay/ATM Private Line networksbecause it eliminates burdensome PVCmanagement.

RReelliiaabbiilliittyy aanndd SSeeccuurriittyyHigher reliability and security is made

possible by the 24x7 ENOC monitoringand the use of Multi-Protocol LabelSwitching (MPLS) in the corearchitecture. MPLS is transparent to thecustomer, and allows for configuration ofa dedicated logical connection for eachcustomer. Ethernet Virtual Connections(EVCs) provide logical point-to-pointdedicated connections between twocustomer locations. Virtual LANs (VLAN)are assigned to the EVCs to ensuresecurity of customer traffic.

The dedicated MPLS tunnel adds alevel of security to customer traffic andoffers enhanced Grade of Serviceparameters. This enables AT&T to makethe product robust, help segregatecustomer traffic by establishing a secureEVC over a shared infrastructure, and tosupport many customers efficiently byallowing scaling to meet customerneeds more effectively. Additionally,MPLS allows for support of Service LevelAgreements (SLA) and providesredundancy in the core, trafficengineering and fast-reroute.

SSuuppeerriioorr NNeettwwoorrkk PPeerrffoorrmmaanncceeThe OPT-E-MAN services provide

guaranteed bandwidth through the MANat the native speed of the customerapplication(s). The service also offers theultimate solution for customersexperiencing bottlenecks in the WAN. Inaddition to higher bandwidth optionsand scalability, the services are secureand reliable.

SSeerrvviiccee LLeevveell AAggrreeeemmeennttssAll SLA’s are found in both the state

and federal tariffs with associatedcredits. Packet Delivery Rate, Latencyand Jitter SLA’s are offered on an end-to-end basis, including the local loop.AT&T provides an Availability ServiceLevel Agreement of 99.95% per month,and service outage credit is offered ifthe customer’s service is disrupted.OPT-E-MAN Basic and Basic Plus have aService Level Objective of a 4-hourmean time to repair end-to-end,including the local loop, per month.

The Bronze Grade of Service (GoS)provides a Packet Delivery Rate of 99.5%and Latency of 27 ms one way. SilverGoS provides a Packet Delivery Rate of99.9% and Latency of 18 ms one wayand Jitter of 12 ms.

PPrriicciinnggService is priced on a per customer

location basis due to the nature of theservice. Two main rate elements arerequired at each customer premise:Basic Connection (port charge) andCommitted Information Rate (CIR). TheBasic Connection charge is inclusive ofthe port, transport and interface. TheBasic Connection consists of either a10/100 Base T connection or 1 Gbpsconnection. There is no premium priceplaced on the Basic Plus ports (multi-point). The CIR charge is for one of eightavailable bandwidths. Charges vary

based upon the Bronze orSilver Grade of Service andlength of term (1, 2, 3 or 5year). In addition, for termsof 2, 3 or 5 years, one timenon-recurring charges arewaived. If additional EVCsper connection/perlocation are needed, thecustomer will not incur anadditional charge per EVCaccording to the Grade ofService selected.

OPT-E-MAN (Metro Ethernet)

Continued from page 5

7

PPhhyyssiiccaall NNeettwwoorrkkThe diagram on page 6 shows a high-

level view of the AT&T Optical Ethernetenvironment. The Cisco 7600-basedEthernet Optical Core is surrounded byCisco 3550 devices at the customerpremise which are owned and operatedby AT&T. For enterprise locationconnectivity (Transparent LAN, or TLS*)such as that shown at the extreme leftand right sides of the diagram, opticaltransport provides the physical layerconnectivity between standalonecustomer locations and a locationhoused in a Multi-tenant Unit. Similarly,ISP backbone connectivity (top) providesthe basis for Dedicated Internet Access,as well as connectivity to AT&T’smanaged Layer 3 VPN services.

*TLS is simply a high-speedconnection between two or more LANsegments across a metro or wide areathat gives users the appearance ofbeing connected to the same local areanetwork. It provides an all-Ethernetmodel that simplifies the handoffsbetween the local and transportenvironments, yet is perfectly capable oftransporting Layer Three protocols suchas IP.

SSuummmmaarryyMany customers today utilize

transport and packet-based services as ameans for interconnecting two or morelocations. This interconnection is donevia bridges and routers. It can be quiteexpensive, and does not provide a lot offlexibility. OPT-E-MAN provides themeans for customers to migrate theircurrent LAN topologies to a fasterstandard that is low cost, simple andflexible. It offers reliable and securenetwork architecture with an MPLS core,integrates seamlessly with pre-existinginfrastructures, scales to LAN speeds,supports the most common enterpriseapplications and supports all topologies.

TToomm DDaavviiddLiaison ManagerAT&T Consultant/Vendor SalesGroup

W e l c o m e M i k e A a r o n

I am very excited about joining theConsultant Vendor Sales Group.Working in a variety of positions withthe company over 18 years, I’vediscovered I really enjoy working withcreative business people. Buildingbridges between clients, consultantsand AT&T seems like the natural nextstep for me!

I started with Pacific Bell Directoryin 1988, working with new business start-ups. I spent twoand half years in that department, then received my firstpromotion. My first official day as a Manager was the dayafter the Loma Prieta earthquake. I was the only Managerwho made it into the Walnut Creek office that day. Talkabout trial by fire! My first executive decision was to assignone person to answer calls, and to leave the rest of thelines open for emergency calls. We were really isolated fora while, but the team really banded together that day, andwe all supported each other. In many ways, it was a greatway to start a new job! But I don’t want to repeat it.

After nine great years with that team, I was ready fornew challenges. I moved to Pacific Bell’s Consumerorganization and became an Escalation Manager forExecutive Complaints. It was very gratifying to workthrough complex issues directly with customers. I learned alot about the power of listening, and I developed a strongbelief in staying with an issue all the way to the end.

Then it was on to the Business side of the house. Isupported the Alarm, Answering Service, Third Tier Carriersand Enhanced Service Providers. Working with this veryspecialized group of customers taught me a lot aboutunique applications for our products and services, which Ibelieve will be very helpful in this next stage of my career.

On a personal note, I was born in Spokane, Washington,and I’ve been in California for 25 years. I originally camehere to go to college. I ran track in high school, and wasoffered scholarships in Florida, Hayward, San Jose, andSacramento. I chose Sacramento because many of myfriends decided to go there. It was one of the bestdecisions of my life. I graduated from CSU Sacramento in1987 with a Communications degree. I also have an AA inBusiness Management. I have two children and twogranddaughters who bring great joy to my life.

I look forward to working with you, and to being a partof this great CVSG community.

MMiikkee AAaarroonnLiaison ManagerAT&T Consultant/Vendor Sales Group

8

nn aa nn cc yy gg rr oo vv ee rr

Y i k e s , I ’ v e b e e n h a c k e d !

My friend Alanrecently called hisInternet ServiceProvider (ISP) with acable-modemproblem, and whenhe was asked toverify the emailaddress associated

with his account, he learned he’d beenhacked. So when Alan called to ask mewhat, if anything, he could do, we had tofirst determine whether he had trulybeen hacked, or if he was a victim of anemail hijack.

EEmmaaiill hhaacckkss vveerrssuuss eemmaaiillhhiijjaacckkssWhen someone uses your email

address to send messages, but you canstill log into your account and accessand use your email, you have beenhijacked. Hijackers use valid emailaddresses that are not their own as thereturn address when sending out spam.That way, it looks like the message camefrom a person other than themselves.They get these addresses from a varietyof sources, including databases they canpurchase, or by sending out viruses andworms that infect computers, whichcauses the infected computer to sendout additional spam or viruses.

But when an email account is hacked,the email password is changed so theaccount owner can no longer log in totheir account and access their email.The hacker can also change the “secretquestion” used to help retrieve forgottenpasswords, locking the owner outcompletely.

WWhhaatt tthhee bbaadd gguuyyss ddoo wwiitthhhhaacckkeedd aaccccoouunnttssIn Alan’s case, he had never used the

email associated with his ISP account,even though it had been active forseveral years. And he had no idea whatthe password was. So, after asking hisISP to reset the password, Alan and Ilogged in and within seconds, we couldsee that he had definitely been hacked.

In fact, it looked as though his accounthad been compromised soon after it wascreated, with the hacker using the mainaccount for his personal use, and sub-accounts for sending spam andmessages to other hackers. Most peopledon’t know that many email accountsallow users to create and use sub-accounts so each member of a familycan have a unique email address.

In all, Alan’s hacker created elevensub-accounts with names like speed4U,hackerboy, hack1, and more. The sub-accounts even had instant messagescreen names associated with them. Thesub-account inboxes were filled withthousands of “can’t be delivered”messages, making it pretty clear theaccounts were used to send out spammessages. There were also manymessages from what appeared to beother hacker-types, with cryptic meetingnotices, phone numbers, and even a fewsystem administration tips.

The main email account was evenmore telling about Alan’s hacker. Theinbox was filled with bank statements,airline itineraries with travel from SanFrancisco to Russia and Poland, andemail from professors and students ofRussian literature. The hacker had alsoused Alan’s account to sign up fornumerous Unix and investmentnewsletters. And he even used the emailaddress to apply for membership in the“Good Sam Club”, a campingorganization. But what was mostdisturbing were the numerous emailsfrom Alan’s ISP thanking the hacker forcontacting them and letting him knowthat his reported trouble had beenresolved. Alan never once contacted hisISP about any of those issues.

So, in addition to getting free emailwith friendly, helpful support, emailhackers get other added benefits fromhacking someone’s email account – likeconducting criminal activity, which willnever be traced back to them. Instead,the authorities could come knocking onthe doors of victims like Alan.

Whensomeoneuses your

emailaddress to

sendmessages,

but you canstill log intoyour accountand access

and use youremail, youhave beenhijacked.

9

Additionally, hacked emails can causethe account owner all kinds of othertrouble, for example:

• Spam or viruses can be sent from thehacked account, which could damagethe victim’s or their company’sreputation and credibility.

• Email addresses and entire domainscan be put on blocked lists. If theemail belongs to a company, thiscould impede business.

• Some accounts are tied to the owner’sbilling information, giving the bad guyaccess to all sorts of personalinformation.

• The hacker can also gain access topersonal information in the owner’sprofile, including adresses, phonenumbers, gender, birth date, work andschool addresses.

• The hacker can gain the ability tomake changes to the victim’s service.

• Hackers can also play games bysending disparaging email to peopleyou know, and of course, they’ll thinkit was you.

Alan was somewhat lucky, as he hadnever used this account. If he had, therecould have been all kinds of bankinginformation, receipts, credit cardnumbers and other personal informationin his inbox, sent file, and deleted folder.The hacker would have had access to allof that, too.

HHooww eemmaaiill hhaacckkss hhaappppeennHackers hack into email accounts the

same way they hack into computers.They have been known to:

• Crack weak passwords by usingscripts to try different passwordcombinations with email addresses.

• Hack into ISP servers to stealpasswords.

• Steal passwords using a virus orkeylogger.

• Or, as in Alan’s case, set up theaccount with a default password thatwas never changed.

WWhhaatt ttoo ddoo iiff yyoouurr eemmaaiill iisshhaacckkeedd• Call your ISP, tell them what

happened and have them reset thepassword immediately. Free services

may not have customer servicenumbers, but typically have a “forgotyour password?” function.

• Reset your password to somethingdifficult to guess.

• If you can’t get your password reset,get a new email account.

HHooww ttoo kkeeeepp tthhiiss ffrroommhhaappppeenniinngg ttoo yyoouu• Cancel all unused email accounts and

check the ones you use on a regularbasis to ensure that no unwantedsub-accounts have been created, andthat no other suspicious activity ishappening.

• Don’t abandon email accounts. If youabandon an account, it can be hackedand used by others. Close or deleteunused email accounts instead. Mostof the free email services now havedelete features, but it can take up to30 days for the mailbox to be fullydeactivated.

• Don’t use “remember me” whenlogging in. If someone else walks upto your computer, or up to acomputer you used in an Internet caféor office, they can log in withoutknowing your password, and lock youout of your own account.

• Try not to use free email accounts foranything important. If your free emailaccount, and all the information in it,went away tomorrow, you could havesome big problems.

• Choose a good complex password byusing a combination of upper andlower case letters, numbers, and/orspecial characters whenever possible.Change it often.

• Remember your secret answer. Don’ttreat this lightly. The answer doesn’teven have to be true, just somethingyou’ll remember.

• Change the default passwordimmediately, even if you don’t plan toever use the account – SomethingAlan probably won’t forget to do inthe future.

NNaannccyy GGrroovveerrRegional ManagerAT&T Corporate InformationSecurity

If youabandon anemailaccount, itcan behacked andused byothers.

10

A T & T B u s i n e s s D i r e c t ®

The evolution ofAT&T BusinessDirect®has been bothexciting and constant.As communicationnetworks havebecome anincreasingly integralpart of businesses’

operations and processes, electroniccustomer service that provides criticallevels of visibility and control hasbecome essential. The cornerstone ofAT&T’s commitment to meeting thiscritical service evolution is AT&TBusinessDirect, which delivers efficientand effective capabilities to AT&Tbusiness customers, 24/7.

AT&T BusinessDirect’s suite of over300 productivity-enhancing applicationsenables customers to reroute networktraffic in real time, test circuits, reportand track service problems, place ordersand check status, pay bills electronically,and perform other customer service andnetwork management-related tasks.Customers can do all this by leveragingsystems and information that previouslywould have been accessed only by AT&Tpersonnel. In this way, businessprocesses are more transparent, andtransactions are far more efficient, withflow-through capabilities to back-endsystems versus human intervention.

AT&T recently expanded its globalreach with the launch of AT&TBusinessDirect Map International. Now,customers can graphically view andmanage their network operations,inventory, and complexities in 88countries with a click of a mouse.

The AT&T BusinessDirect eBill toolwas recently enhanced to includewireless billing. Customers can nowmanage all of their telecom expenses inone tool. With eBill, they can view AT&Tinvoice details, analyze billing data viastandard or custom reports, makeinquiries and request billing adjustments,view payment history, and pay bills all inone place.

By putting advanced networking toolsinto the hands of our customers, AT&T isgiving businesses real-time, end-to-endvisibility into their cross-applicationenvironments to help them cut costs,gain market share, and link with theircustomers more effectively.

AT&T BusinessDirect was named BestEnterprise Customer Portal in 2005 bythe Yankee Group for the secondconsecutive year with the uniquedistinction of being the only carrier toreceive “Superior” ratings in allcategories. And, its click-to-chatfunctionality, which allows users tospeak to a live AT&T Representative, wasmost recently named the TMCCommunications Solutions 2005 Productof the Year.

Plans are in place for AT&T to launchits next generation of tools that takeAT&T BusinessDirect from the PC toalternate access devices like PDA’s,thereby increasing the mobility ofcustomer service.

Each month, users conduct over 3million transactions using AT&TBusinessDirect. Users are diverse,ranging from large multinationalorganizations with broad global networksupport needs to businesses with moretargeted service requirements.

RRoobbeerrtt SSllooaannVice PresidentAT&T eSales & Service

“We willcontinue to

leveragetechnology,enhance the

portal’srobust suiteof tools anddeliver thebest onlineexperience

to ourcustomersaround the

world.”

rr oo bb ee rr tt ss ll oo aa nn

11

Q U I ZTest Your IT IQ

11According to a recent survey, what percent of companies haveever had to suspend key business operations as a result of adisaster?

22Which of the following is a benefit of moving an in-house datacenter to an Internet-based hosting environment?

33Which of the following could allow companies to achieve a highlevel of functionality during a pandemic?

44Businesses face many different kinds of emergencies. Shouldbusinesses have a single business continuity plan or multipleplans for each emergency?

55Which of the following is the most significant threat tobusinesses today?

66All the business continuity planning in the world won’t meananything without awareness and buy-in from which of thefollowing?

3 %

12%

28%

19%

Network redundancy

Uninterruptible powersupplies

24/7 support

All of the above

Employee vaccinations

Working with masks on

Not letting employeesleave the premises

Enabling employees towork remotely

Single plan

Multiple plans

Hackers

Natural disasters

Viruses and worms

SPAM

Local or state government

Employees

Building management

Local law enforcement

Answers on page 19

W h e n S t a f fC a n ’ t G e t T o

W o r k

The human resource side of disasterplanning was brought into sharp focusafter the July 7th, 2005 bombings inLondon. According to Ross Armstrong,Senior Research Analyst at the Info-TechResearch Group, a firm of IT industryanalysts, “Most planners think about ITdowntime or loss of power but don’tconsider situations in which thetechnology is working but theiremployees can’t reach the office.” Info-Tech set out the followingrecommendations in the aftermath ofthe bombings:

• Ensure that the plan specificallyidentifies “key employees” whorequire system access, and define howthey will gain remote access tocritical systems in the event theycannot reach the workplace. Thiscould include enabling homecomputers for corporate access orissuing laptops.

• Set up a VPN for PC access. Utilizeremote teleconferencing and theability to call forward business phonesto home numbers.

• Make it a policy that laptop users taketheir PCs home nightly, even if theydon’t intend to do work at home thatevening.

• Enable network administrators andsystem operators to do as muchremote management as possible. Inaddition to line workers, IToperational staff need remote systemaccess to ensure business continuity.

Take this short quiz to test yourcontingency planning IQ.

12

N e x t G e n e r a t i o n N e t w o r k S e r i e sT h e E v o l v i n g N e t w o r k

IInnttrroodduuccttiioonnThe telecommunications network, the

central nervous system of our wired andwireless world, is becoming somethingmore. The signs of network evolution areeverywhere. The network is no longerjust a passive means of transferringinformation from one place to another; itis the key enabler of new forms ofcollaboration (such as webconferencing), new business models(such as on-line auctions), new forms ofglobalization and outsourcing, and newforms of computing.

Data can now be transferred at bit-rates dramatically greater than everbefore. Voice and data networks areconverging, so that a single integratedplatform can replace the specializedprivate networks of years past. Wirelineand wireless access protocols arecoming together, so that a reliablenetwork connection is no longerdependent on location. And a “call” isno longer a connection restricted to asingle device. Today, a call is coming tomean a continuous voice, data or videointeraction with one or moreparticipants, that can be seamlesslyhanded off between devices. Today’snetworks are also easier to manage, andallow for better reporting on traffic andusage. Computer services can bedelivered using Internet Protocol (IP)technology, which allows for dynamictraffic management and load balancing.All these changes mean the networkcan support an unprecedented degree ofglobalization for large enterprises.

WWhhaatt iiss tthhee NNeettwwoorrkk,, AAnnyywwaayy??The traditional view is to consider the

network only as a means of access andtransport, a complex but essentiallypassive assemblage of copper, fiber andswitches. In this view, the network’s roleis simply to move data from one placeto another, and it’s only expected todeliver two things: speed and reliability.

Even in this role, though, the networkis becoming more intelligent and moreagile. Networks are like chocolate cakes,built on multiple layers of components

and technologies. At every layer, newtechnologies are increasing flexibilityand agility.

At the lowest layer we have the purephysical transport of bits and bytes. This“photonic mesh layer” is somethingthat’s becoming reconfigurable with theuse of optical components that allow forrapid modification of network routes.One step above, the “SONET layer” isbeginning to use technologies such asVirtual Concatenation and Link CapacityAdjustment to enable bandwidth ondemand. Bandwidth increments can beprovisioned in less than 10 seconds, andcustomers will only need to pay for thebandwidth they use. Finally, intelligentrouting of IP traffic, throughtechnologies such as AT&T’s IntelligentRouting Service Control Point and MPLSfast reroute, can add even moreflexibility and control.

In addition, a new, more expansiveview of the network is emerging. In thisview, the network is evolving into anintelligent repository of content,functions and applications – adistributed computing utility and thefoundation for a global computing grid.Network-centric hosting, contentdistribution, massively multi-player on-line gaming, and software-as-a-serviceprovide glimpses of how the networkwill evolve.

When its full potential is understood,the network can be seen as a vast arrayof integrated hosting centers, intelligentedge devices, dynamic routing logic andembedded business rules. It can supportmany computing tasks that once wouldhave been assigned to dedicatedprocessors. In fact, this kind of networkcan support all kinds of processingactivity, from large-scale batch programsfor biomedical research to transactionalapplications for day-to-day business.

This evolution has been under way forsome time. In late 2005, AT&Tcelebrated its 10th anniversary in theInternet hosting business. In the pastdecade, AT&T has established thirtyInternet Data Centers (IDCs) on four

“The networkis not justbecoming

more agile,but also

evolving tobecome aglobally

dispersedutility gridwhich will

provide notjust contentdistribution

andcollaboration,

but enablenew types

of distributedbatch andtransactionprocessing.”

JJooee WWeeiinnmmaann,,Emerging Services

VP, AT&T

13

Newdistributedarchitectures,combinedwith newandemergingbusinessmodels, areenablingmore flexibleoptions.

continents. This part of the business hasalso evolved beyond simple “hosting.”The IDCs today provide a large, highly-secure infrastructure for distributedcomputing. That means companies nowhave new options for doing business.New distributed architectures, combinedwith new and emerging businessmodels, are enabling more flexibleoptions.

NNeeww SSeerrvviiccee OOppppoorrttuunniittiieessAs an example of the possibilities,

consider the use of Radio FrequencyIdentification (RFID) technology, in whichsmall chips can be used to tageverything from individual items topallets of goods. RFID systems are verynetwork-centric applications, and naturalcandidates for distributed processingand utility delivery. Readers collect tagdata, edge servers do event filtering andcaching, tracking information istransferred across the network, andnetwork-based information servicesenable improved supply chainmanagement. AT&T’s new network-basedRFID service will include end-to-endmanagement, from readers to reports,and RFID data can be fed from thenetwork directly to a customer’s ERPand supply chain management systems.

Other network capabilities will providethe foundation for complex services builtusing service-oriented architectures thatenable the rapid assembly of modularcomponents. These components willinclude functions such as micro-payments, user authentication, naturallanguage translation or presence andlocation services. Utilizing the networkas a computing utility will reduce thetime to market for any network-relatedofferings, such as the delivery of contentto cell phones, new services based onseamless mobility, and a broad range ofsoftware applications offered asnetwork-based services. The same willbe true for offerings such as highperformance computing for engineering,scientific and medical communities.

LLooookkiinngg FFoorrwwaarrddVirtually any application can run on a

network-based architecture; an optimalend-state combines service-orientedconcepts with a network-enableddistributed computing environment. The

next generation network will meanmajor changes in the IP servicesbusiness, with true utility pricing modelsthat enable new kinds of services.

The evolution of the network willmean greater flexibility and control,emerging technologies for management,orchestration, and optimization and newpricing models.

In the end, new technologies allow fornew possibilities, but new businessmodels are needed to bring thosepossibilities to life.

©2006 AT&T Knowledge Ventures. All rights reserved.08/28/06 AB-0807

14

C V S G S u r v e y R e s u l t s

As you read in Kari’s Corner, change is in the air.And from cover to cover, you’ll see change in thisissue of UPDATE. Over 100 of you took time out ofyour busy schedules to give us your opinions andideas in response to our CVSG Communication Survey.Many of your suggestions are reflected in this issue ofUPDATE, and we’ll be making additional enhancementsin future editions.

The survey was quite detailed, and you gave us awealth of information with your responses – far toomuch to cover comprehensively in this newsletter.Here are some of the highlights:

When asked about the most helpful communicationvehicle to you – your overwhelming favorite isinteraction with your Liaison Managers, either bytelephone or e-mail (76%). Not at all surprising – ourLiaison Managers are the best in the business! Tied forsecond is UPDATE and various websites, and finally,our streaming media broadcasts.

You told us that most of you (69%) prefer to readUPDATE in print rather than online. We’ll keepproviding access digitally as well as in print, becausewe know you like choices.

When it comes to your preferences on articles, youshow the diversity that makes up the consultantcommunity. 63% of you want very technical articles,and 42% of you want less technical articles. Butwhatever the technical level, you overwhelmingly(91%) want the article to be short and concise! You’llfind a blend of articles this quarter, and we will beadding a “Quick Tips” segment in our next issue.

We are very pleased to see that 90% of ourrespondents say the information in UPDATE helps youto recommend AT&T products and services. We willcontinue to provide industry information as well asAT&T-specific product information to continue thattrend.

The majority of you said you would like to see moreconsultant columns and opinions. And 18 respondentssaid they would be willing to write an article. If youare one of them, please contact Elaine Tipping directly([email protected]) to discuss upcoming issues!

Thank you for your support and your suggestions.Many of you took this opportunity to say very kindthings about our team and our company, and weappreciate it! Please continue to share your thoughts,either through your Liaison Manager or by [email protected].

AT&T and El Camino Hospital have reachedagreement on a new data services contract. Under theterms of the five-year contract, AT&T will be theprimary data services provider, delivering AT&T OPT-E-MAN® service and Internet service to the newlyopened three-story 66,000-square-foot MelchorMedical Office Building on the hospital campus.Additionally, AT&T will supply managed securityservices, such as intrusion prevention, enhancedfirewall administration and network management.

AT&T OPT-E-MAN service is an optical broadbandInternet access solution that will be implemented inthe Melchor Medical Office Building to consolidateand aggregate network access. In addition, thededicated Internet connection will provide extensivereach 24 hours a day and will provide secure andconsistent Internet access to the specialty clinics andpractices located within the building, whose tenantsrely heavily on Internet access for clinical, billing andresearch purposes.

Together, these services deliver a convergedsolution that will enable El Camino Hospital, a not-for-profit hospital ranked as a quality patient-safetyleader in California and the United States, to providetop network services to the researchers, doctors andnurses it attracts from the surrounding Silicon Valleyarea . By using AT&T's security and managementservices, the hospital can provide its tenants greaterassurance against security risks, such as virusoutbreaks. Additionally, by outsourcing all design,implementation and maintenance, El Camino Hospitalwill consolidate and reduce operational costs.

"With ongoing campus modernization and theaddition of the Melchor Medical Office Building, weneeded a provider capable of designing, implementingand maintaining a technologically advancedcommunications network," said Ken King, vicepresident of facilities, El Camino Hospital. "We areconfident that the solution provided by AT&T willsupport secure electronic communications bydelivering reliable access to patient records as well asthe Internet."

C a l i f o r n i a H o s p i t a lU p g r a d e s D a t a

N e t w o r k W i t h A T & TS e r v i c e s

15

IP-basedservices . . .enablecustomers toaccess criticalapplicationsandinformationvirtuallyanytime,anywhere,and usingany device.

A t & T L a u n c h e s R e m o t e H o m eM o n i t o r i n g V i d e o S e r v i c e

N a t i o n w i d e

AATT&&TT HHoommee MMoonniittoorr BBaacckkggrroouunnddThe AT&T home monitoring service is an

innovative, IP-based offering that will helpcustomers to stay more connected to theirhomes and families while they are away.The service enables customers to usepersonal computers and Cingular wirelessdevices to access high-quality, streamingdigital video and other real-timeinformation from their homes – virtuallyany time and anywhere.

The AT&T home monitoring servicecombines live and recorded video (non-audio) capabilities with a range ofenvironmental sensor options to providecustomers with a powerful, flexible toolkitto help them stay connected to the peopleand things they value most. The serviceallows users to remotely control lighting intheir homes, and can provide a range ofalerts and reports on home conditions,such as motion, door and window activity,water leakage, and temperature changes.Users can easily customize alerts andactions based on their specific needs. Forexample, a user can program the serviceto send a text message alert to a cellphone when motion is detected in an areaof the home, while at the same timeautomatically turning on lighting andrecording video of the same area.

SSeerrvviiccee FFeeaattuurree OOvveerrvviieewwThe AT&T home monitoring service

enables customers to receive live orrecorded video (non- audio) over virtuallyany Cingular wireless device that iscapable of Internet connection. Customerscan also access live or recorded video overany broadband-enabled PC, and receivecustomized alerts from a variety ofoptional sensors and other equipment.

The high-quality video camera includedin the AT&T home monitor service packageallows users to control features remotelyfrom nearly any broadband-enabled PC.Users can pan and tilt the camera, andcapture still photos remotely.

The service comes with a starterpackage of equipment which includes:

• A pan-and-tilt IP camera

• Two power modules that enable deviceconnectivity via home power outlets

• A wireless door/window sensor

• A wireless gateway for connectingequipment to a home network

• All needed software and instructions

CCuussttoommiizzeedd,, PPrrooggrraammmmaabblleeSSeerrvviiccee AAlleerrttss aanndd OOppttiioonnss

The full power of the AT&T homemonitoring service is realized with fullyprogrammable service functions, which canbe easily established and updated via anybroadband-enabled PC. The service can beset to deliver a wide range of alerts to auser’s cell phone, based on specificparameters set by the user.

Additionally, the service enables usersto combine their cameras and sensors todeliver specific reports and actions undera variety of circumstances. For example:

• If motion is detected in a specific room,a user can program the service toautomatically turn on a lamp and beginrecording video of the room, while alsosending an alert to the user’s cellphone.

• If a user wants to be notified whenchildren arrive home from school, theservice can send an alert, allowing theuser to pull up a live video feed.

The new service is an example of theongoing AT&T strategy to deliver a newgeneration of converged, IP-based servicesthat enable customers to access criticalapplications and information virtuallyanytime, anywhere, and using any device.

16

I have a laptop,three USB drives, adigital camera andextra media chips. Ihave a cell phone. Idon’t have an iPod®or MP3 player, aBlackberry® or a PDA,mainly because I

don’t want to have to replace any ofthem until I decide that I want to. I alsodon’t want to lose what I store on thosedevices.

What are the security issues? Often,the information we store on thesedevices is worth more than thehardware itself. We keep personal andbusiness information on them; we keepdigital pictures and music; we keepcontact lists and appointments. You canstore copies of your tax return on yourphone or camera if you choose. You cancopy pictures and music to your laptop.If the pictures are your only copies oryou spend days downloading andorganizing music, losing them can be abigger deal than losing the device –because you can easily replace thedevice. If what you keep on thesedevices is confidential, you also have toworry about insecure wirelesscapabilities or spyware.

PPrrootteeccttiinngg aa LLaappttooppLaptops are different than other

portable devices we carry; they’reheavier and more expensive, whichcreates some unique problems.Including the installed software, theaverage laptop could cost $1,000 to$2,000 dollars. That doesn’t include thetime it takes to configure, or the valueof lost files.

For a portable device, a laptop isawkward and bulky. It’s convenient tohave your laptop when you’re in aconference room or sitting on a plane.It’s inconvenient when you need to stepout of the room for a minute or youhave to go through airport security.

Even in the US Department of Stateheadquarters building, an unattendedlaptop was stolen from a conferenceroom. A locking cable long enough to goaround a conference table is impractical;but there are not many options – lock itout of sight, carry it, or accept the risks.

PPrrootteeccttiinngg OOtthheerr SSmmaallllEElleeccttrroonniiccssCameras, cell phones, MP3 players,

USB drives and PDAs are all easy tocarry around. They don’t have theinconvenience factors that laptops do.They don’t get in the way when you goto lunch or need a break. If you have toreplace one you will probably wind upwith a better model for the same or lessmoney than the lost one. If you don’tkeep any valuable or irreplaceableinformation on a device you’re probablynot going to pay attention to anysecurity strategies. Just as with a laptop,if you’re willing to accept the risk, atleast evaluate what you have stored onthe device.

PPrrootteeccttiinngg tthhee IInnffoorrmmaattiioonnLet’s face it, it may not seem worth

the effort to protect something that’seasy to replace. No matter howannoying it might be to lose anelectronic device, we usuallycompensate with the joy we get frombuying a newer model. On the otherhand, the information, pictures, musiccollection, contact information, bookdraft or term paper are not so easy toreplace. Let’s take a look at protectingthe information on the devices. It’s notnecessarily difficult, and can reallyminimize the pain of a lost or stolenitem.

BBaacckkiinngg UUpp YYoouurr FFiilleessA friend of mine spent most of the

last 12 months writing her first book.Around the end of chapter 10, someonebroke into her home and stole herlaptop while the family was out todinner. This was a book for which she

Often, theinformationwe store . . .

is worthmore than

the hardwareitself.

S e c u r i t y f o r S m a l l E l e c t r o n i cD e v i c e s

jj ee rr rr yy hh ii nn ee kk

17

had received an advance, and for whichshe had a deadline.

I had advised her to buy a USB driveand make backups, but she didn’t.Fortunately she had emailed chapter bychapter to her husband so that he couldreview and proof read for her, enablingrecovery of the first 9 chapters. Eventhought she only “lost” chapter 10, itrepresented several weeks of hard work.She had purchased a warranty on thelaptop, and was able to replace it at nocost. And she now has a 128 megabyteUSB drive, plenty for her book, andbacks up her work every day. She carriesit with her wherever she goes.

Backing up any electronic device hasalways been one of the most importantand most ignored security tasks. Mostportable devices come with removablememory chips or sticks that can becopied into a computer using aninexpensive chip reader. From there, youcan copy the files to a backup chip, aUSB drive, a CD or DVD. A 2 gigabyteUSB drive costs $50 to $60 on sale.Backing up your information has neverbeen easier, or less expensive.

EEnnccrryyppttiioonnEncryption makes data illegible to

unauthorized users. It’s not a fix-all, butit does have its place. Some USB thumbor keychain drives require a password tostore or read encrypted information. Onthese, you can create one area orpartition with security and one without.As long as you remember yourpassword, you alone can accessconfidential files or folders.

If you plan to store information youdon’t want others to see on a PDA, buyone with encryption and use it. Youprobably don’t need this level of securityon your music player, cell phone, orcamera.

For laptops, Microsoft® includesEncrypting File System® (EFS) inWindows XP®. Note that it takes time tolearn how to use EFS and that it’s notthe default setting.

WWiirreelleessss CCaappaabbiilliittiieessThe wireless capabilities we can carry

around with us make staying in toucheasy. Most laptops come with built-in802.11 wireless adapters. Otherelectronics come with Bluetooth

Wireless capability. These devices areoften designed to work “right out of thebox” with no security protectionenabled.

Unfortunately, malicious people withbad intentions and wireless proximitydetectors prowl public Wi-Fi areas tryingto gain access to laptops and PDAs.Taking a few precautions can help keepthem out of your data:

• Run a software firewall.

• Set your adapter not to permit “Peerto Peer” network connections. Thatmeans your device should onlycommunicate with an access point orrouter, not directly with anothercomputer.

• Encrypt your wireless sessions withWireless Protected Access (WPA) orWPA2 if possible. Otherwise, useWired Equivalent Privacy (WEP), whichis less secure but more commonlyavailable

Losing personal information to anidentity thief can be very painful. Takethe time to secure your wirelesscapabilities before your privacy iscompromised. You won’t have to regretit later.

JJeerrrryy HHiinneekkSenior Business Security ManagerAT&T Information Services

Backing upanyelectronicdevice hasalways beenone of themostimportantand mostignoredsecuritytasks.

18

A T & T C o m p l e t e sA c q u i s i t i o n o f U S i

AT&T Inc. has completed theacquisition of USinternetworking, Inc.(USi). The transaction complementsAT&T’s existing managed servicescapabilities and paves the way for thecompany to tap into the burgeoningapplications market with new offers forbusinesses of all sizes.

AT&T concluded the transaction afterthe two companies received allnecessary approvals. In September, AT&Tannounced it would acquire USi forapproximately $300 million in cash andassumed debt.

IT market research and advisory firmIDC estimates that applicationmanagement services represented a$20.4 billion market worldwide and a $9billion market in the United States in2005, and expects both markets tocontinue to experience growth. (Source:IDC, Worldwide and U.S. ApplicationManagement Services 2006-2010Forecast Update, Doc #203607, Sept2006).

“This transaction strategically alignsUSi’s software and eBusinessmanagement services and consultingexpertise with AT&T’s existing portfolioof enterprise hosting and managedservices,” said Forrest Miller, AT&T GroupPresident. “We look forward tocombining USi’s technology andexpertise in applications managementwith AT&T’s global reach, networkingexpertise and extensive hostingcapabilities, which will broaden therange of solutions we offer ourcustomers.”

USi specializes in managed enterprisesoftware solutions and on-demandservices. It provides softwaremanagement and outsourcing servicesfor widely-used popular businesssoftware from companies like Oracle,PeopleSoft, Siebel, Microsoft, IBMWebSphere and Ariba. The company alsodevelops, hosts and managescustomized eCommerce solutions.

“USi’s depth of experience, innovativeand proprietary technologies, and client-centric approach position us solidly as a

market leader in delivering managedapplications services,” said Andrew A.Stern, who will remain as USi’s chiefexecutive officer. “Our clients andprospective clients have respondedfavorably to the acquisition. Bycombining our capabilities with AT&T’smarket access and complementaryservice offerings, we will be able tointroduce new capabilities and serviceofferings more rapidly, without deterringour focus on delivering individualizedclient service.”

Business customers also will benefitfrom access to a single source forInternet data center facilities, ITinfrastructure, network consulting and ITmanagement services. AT&T’s InternetData Centers are connected by one ofthe world’s most advanced and powerfulglobal backbone networks.

Additionally, the AT&T integratedGlobal Enterprise Management System(iGEMS) provides sophisticated, end-to-end global network management,enabling AT&T to monitor and managethe performance of customerenvironments in a proactive, predictiveand preventative manner. Enterprisecustomers also benefit from theindustry’s most powerful online serviceportal, AT&T BusinessDirect® (see page10), which provides customized, secureaccess to information about customers’network environments and enables arange of sales and service functions.

Businesscustomers...will benefitfrom accessto a singlesource for

Internet datacenter

facilities, ITinfrastructure,

networkconsulting

and ITmanagement

services.

19

11.. AAccccoorrddiinngg ttoo aa rreecceenntt ssuurrvveeyy,, wwhhaattppeerrcceenntt ooff ccoommppaanniieess hhaavvee eevveerr hhaadd ttoossuussppeenndd kkeeyy bbuussiinneessss ooppeerraattiioonnss aass aarreessuulltt ooff aa ddiissaasstteerr??

TThhee ccoorrrreecctt aannsswweerr iiss ““2288%%““.

The likelihood of having to suspendkey business operations as a result of adisaster is far from remote. 28% of CIOsand senior IT executives polled by AT&Tin a recent global survey admit thatthey’ve suffered from a disaster in thepast. A surprisingly high percentage ofthose respondents still don’t considerbusiness continuity planning to be anorganizational priority, even whenprevious disasters cost them $100,000or more in revenue a day.

22.. WWhhiicchh ooff tthhee ffoolllloowwiinngg iiss aa bbeenneeffiitt ooffmmoovviinngg aann iinn--hhoouussee ddaattaa cceenntteerr ttoo aannIInntteerrnneett--bbaasseedd hhoossttiinngg eennvviirroonnmmeenntt??

TThhee ccoorrrreecctt aannsswweerr iiss ““AAllll ooff tthhee aabboovvee””.

When a busy, mission-critical datacenter outgrows its current facilities, orwhen it becomes difficult to achieve thedesired performance and reliability in anin-house data center, relocating to aspecialized Internet-based data hostingenvironment is becoming the mostattractive option for more and moreenterprises.

33.. WWhhiicchh ooff tthhee ffoolllloowwiinngg ccoouulldd aalllloowwccoommppaanniieess ttoo aacchhiieevvee aa hhiigghh lleevveell ooffffuunnccttiioonnaalliittyy dduurriinngg aa ppaannddeemmiicc??

TThhee ccoorrrreecctt aannsswweerr iiss ““EEnnaabblliinnggeemmppllooyyeeeess ttoo wwoorrkk rreemmootteellyy””.

CSOs should look at their currenttelecommuting policies as a strategicadvantage in case of a businessshutdown. Do you have the capacity tohave 80 percent of your employeesworking from home? Do they haveaccess to all the information assetsthey’d need? The answers to these andother questions could make a bigdifference if a pandemic or otherdisaster prevents your employees fromcoming to the office.

44.. BBuussiinneesssseess ffaaccee mmaannyy ddiiffffeerreenntt kkiinnddssooff eemmeerrggeenncciieess.. SShhoouulldd bbuussiinneesssseess hhaavveeaa ssiinnggllee bbuussiinneessss ccoonnttiinnuuiittyy ppllaann oorr

mmuullttiippllee ppllaannss ffoorr eeaacchh eemmeerrggeennccyy??

TThhee ccoorrrreecctt aannsswweerr iiss ““SSiinnggllee ppllaann””.

AT&T recommends that businessesdevelop one plan with the ability to dealwith multiple contingences. If you knowwhat’s important to your company andwhat’s needed to ring the cash registers,then you have the basis for 80% of yourplan. The remaining 20% of your plan isreserved for activities specific to aparticular type of crisis. AT&T worksdirectly with business customers todevelop network designs that areappropriate to support specific businesscontinuity requirements.

55.. WWhhiicchh ooff tthhee ffoolllloowwiinngg iiss tthhee mmoossttssiiggnniiffiiccaanntt tthhrreeaatt ttoo bbuussiinneesssseess ttooddaayy??

TThhee ccoorrrreecctt aannsswweerr iiss ““VViirruusseess aannddwwoorrmmss””.

Viruses, worms, and spyware havebeen evaluated as the most significantthreats to organizational cyber security,according to the 2006 AT&T BusinessContinuity Study. All told, 78% of ITexecutives surveyed agree that viruses,worms, and spyware are the three mostsignificant threats to their networks,followed by “hackers” at 43%. Otherthreats to cyber security include SPAM(37% in 2006 versus 44% in 2005), aninternal accident (27%), and internalsabotage (23%). Just 1% said that thethreat of natural disasters taking downtheir network is one of their mostsignificant concerns when it comes tocyber-security.

66.. AAllll tthhee bbuussiinneessss ccoonnttiinnuuiittyy ppllaannnniinngg iinntthhee wwoorrlldd wwoonn’’tt mmeeaann aannyytthhiinngg wwiitthhoouuttaawwaarreenneessss aanndd bbuuyy--iinn ffrroomm wwhhiicchh ooff tthheeffoolllloowwiinngg??

TThhee ccoorrrreecctt aannsswweerr iiss ““EEmmppllooyyeeeess””.

While it’s important to coordinateyour business continuity plans with localgovernment agencies and buildingmanagement, it’s critical tocommunicate your plan to employees.Steps include ensuring that employeesknow where to receive information andupdates; ensuring that mission-criticalemployees know their role in the planand have access from remote locations;and making sure that your plan can beexecuted by alternate employees whenregular employees cannot be reached.

AAnnsswweerrss ttoo IITT IIQQ TTeessttfrom page 7

CSOs shouldlook at theircurrenttelecommutingpolicies as astrategicadvantage incase of abusinessshutdown.

A T & T C V S G U P D A T E D e c e m b e r 2 0 0 6

AArreeaa CCooddee IInnffoorrmmaattiioonnhttp://areacode-info.com/

AArreeaa CCooddee LLooookk UUpphttp://www.my-areacode.com/

AATT&&TT AAccccoouunntt MMaannaaggeerr ((rreeggiissttrraattiioonn rreeqquuiirreedd))http://www.att.com/accountmanager

AATT&&TT BBuussiinneessssDDiirreecctt®®1-800-221-0000 Hot Linehttp://www.att.com/businessdirect

AATT&&TT CCoorrppoorraattee CCoonnttaacctt LLiisstthttp://sbc.com/contactus

AATT&&TT CCuussttoommeerr SSuuppppoorrtthttp://sbc.com/help

AATT&&TT LLooccaall SSeerrvviiccee ((rreeppaaiirr ddeesskk)) 1-800-829-1011

AATT&&TT PPrroodduucctt IInnffoorrmmaattiioonnhttp://ask.sbc.com

BBiillll iinngg IInnqquuiirryy –– WWeesstt1-800-891-1800

CCaalliiffoorrnniiaa PPuubblliicc UUttiilliittiieess CCoommmmiissssiioonn ((CCPPUUCC))http://www.cpuc.ca.gov

CCaarrrriieerr VVeerriiff iiccaattiioonn1-700-555-4141 – Long Distance1-805-700-4141 – Local

DDSSLL 1-877-722-3755

EE--BBiillll1-888-700-5422

FFOOCCUUSShttp://www.thefocus.org

IInntteerrnneett SSaaffeettyyhttp://sbc.com/safety

KKnnoowwlleeddggee NNeettwwoorrkkhttp://www.kn.pacbell.com/products/discounts.html

LLooccaall CCaalllliinngg AArreeaa MMaappppiinngghttp://localcalling.sbc.com/LCA/lca_input.jsp

MMaannaaggeedd IInntteerrnneett SSeerrvviiccee 1-888-613-6330

NNoorrtthh AAmmeerriiccaann NNuummbbeerriinngg PPllaannAAddmmiinniissttrraattiioonnhttp://www.nanpa.com/

PPrriioorriittyy RReeppaaiirr1-800-332-1321

RReeppaaiirr611

UUpp22SSppeeeedd NNeewwsslleetttteerrhttp://sbc.com/up2speed

H e l p f u l N u m b e r s a n d W e b S i t e s

KKaarrii AAgguuiinnaallddoo,, CCVVSSGG LLeeaaddeerr795 Folsom St Rm 517-O2San Francisco, CA 94107415-644-7118email: [email protected]

MMiikkee AAaarroonn,, LLiiaaiissoonn MMaannaaggeerr795 Folsom St Rm 517-P3San Francisco, CA 94107415-644-7129email: [email protected] codes: 209, 408, 415, 510, 559, 650, 707, 831, 916, 925

EErriicc AAgguuiirrrree,, DDaattaa AAddmmiinniissttrraattoorremail: [email protected]

CCoonnssuullttaanntt//VVeennddoorr SSaalleess GGrroouupp HHoott LLiinnee1-800-552-5299

A T & T C o n s u l t a n t / V e n d o r S a l e s G r o u p

TToomm DDaavviidd,, LLiiaaiissoonn MMaannaaggeerr200 Center St Promenade Rm 735Anaheim, CA 92805949-855-5055email: [email protected] codes: 619, 714, 760, 858, 909, 949, 951

LLoowwaayynnee SShhiieehh,, LLiiaaiissoonn MMaannaaggeerr1150 South Olive St Rm 1600Los Angeles, CA 90015213-743-5759email: [email protected] codes: 213, 310, 323, 424, 562, 626, 661, 805, 818

VVeennddoorr CCoonnssuullttaanntt SSeerrvviiccee CCeenntteerr ((VVCCSSCC ))1-800-773-3318

LLOOAA Fax 1-877-778-4141 / 4133

BBeellll AAddvvaannttaaggee ((rreeggiissttrraattiioonn rreeqquuiirreedd))https://bell-advantage.pacbell.com/